IL270935B1 - An apparatus and method for controlling a change in instruction set - Google Patents
An apparatus and method for controlling a change in instruction setInfo
- Publication number
- IL270935B1 IL270935B1 IL270935A IL27093519A IL270935B1 IL 270935 B1 IL270935 B1 IL 270935B1 IL 270935 A IL270935 A IL 270935A IL 27093519 A IL27093519 A IL 27093519A IL 270935 B1 IL270935 B1 IL 270935B1
- Authority
- IL
- Israel
- Prior art keywords
- bounded pointer
- capability
- identified
- instruction set
- processing circuitry
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 54
- 230000008859 change Effects 0.000 title claims description 43
- 238000012545 processing Methods 0.000 claims description 114
- 230000004044 response Effects 0.000 claims description 11
- 238000004590 computer program Methods 0.000 claims description 3
- 230000007246 mechanism Effects 0.000 description 42
- 230000008569 process Effects 0.000 description 39
- 238000013459 approach Methods 0.000 description 14
- 230000001960 triggered effect Effects 0.000 description 13
- 238000010586 diagram Methods 0.000 description 10
- 230000001419 dependent effect Effects 0.000 description 7
- 238000013519 translation Methods 0.000 description 6
- 230000009471 action Effects 0.000 description 5
- 101100494729 Syncephalastrum racemosum SPSR gene Proteins 0.000 description 3
- 230000006399 behavior Effects 0.000 description 3
- 230000007704 transition Effects 0.000 description 3
- 238000007792 addition Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/30181—Instruction operation extension or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/30098—Register arrangements
- G06F9/30101—Special purpose registers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/30181—Instruction operation extension or modification
- G06F9/30189—Instruction operation extension or modification according to execution mode, e.g. mode flag
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/30003—Arrangements for executing specific machine instructions
- G06F9/3005—Arrangements for executing specific machine instructions to perform operations for flow control
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/30003—Arrangements for executing specific machine instructions
- G06F9/3005—Arrangements for executing specific machine instructions to perform operations for flow control
- G06F9/30054—Unconditional branch instructions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/30003—Arrangements for executing specific machine instructions
- G06F9/30076—Arrangements for executing specific machine instructions to perform miscellaneous control operations, e.g. NOP
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/30098—Register arrangements
- G06F9/3012—Organisation of register space, e.g. banked or distributed register file
- G06F9/3013—Organisation of register space, e.g. banked or distributed register file according to data content, e.g. floating-point registers, address registers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/30181—Instruction operation extension or modification
- G06F9/30192—Instruction operation extension or modification according to data descriptor, e.g. dynamic data typing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/32—Address formation of the next instruction, e.g. by incrementing the instruction counter
- G06F9/322—Address formation of the next instruction, e.g. by incrementing the instruction counter for non-sequential address
- G06F9/323—Address formation of the next instruction, e.g. by incrementing the instruction counter for non-sequential address for indirect branch instructions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/34—Addressing or accessing the instruction operand or the result ; Formation of operand address; Addressing modes
- G06F9/35—Indirect addressing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/38—Concurrent instruction execution, e.g. pipeline or look ahead
- G06F9/3861—Recovery, e.g. branch miss-prediction, exception handling
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/38—Concurrent instruction execution, e.g. pipeline or look ahead
- G06F9/3861—Recovery, e.g. branch miss-prediction, exception handling
- G06F9/3865—Recovery, e.g. branch miss-prediction, exception handling using deferred exception handling, e.g. exception flags
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/08—Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
- G06F12/0802—Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches
- G06F12/0862—Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches with prefetch
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1416—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
- G06F12/1425—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block
- G06F12/1441—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block for a range
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/468—Specific access rights for resources, e.g. using capability register
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Mathematical Physics (AREA)
- Storage Device Security (AREA)
- Executing Machine-Instructions (AREA)
- Advance Control (AREA)
- Processing Or Creating Images (AREA)
- Memory System Of A Hierarchy Structure (AREA)
- Stored Programmes (AREA)
Description
PCT/GB2018/051116 WO 2018/229455 AN APPARATUS AND METHOD FOR CONTROLLING A CHANGE IN INSTRUCTION SET The present technique relates to the field of data processing.There is increasing interest in capability-based architectures in which certain capabilities are defined for a given process, and an error can be triggered if there is an attempt to carry out operations outside the defined capabilities. The capabilities can take a variety of forms, but one type of capability is a bounded pointer (which may also be referred to as a "fat pointer").When processing circuitry of an apparatus is arranged to execute a sequence of instructions, the capabilities can be used to constrain operations performed by the processing circuitry when executing those instructions. For example, by such an approach, it is possible to effectively police memory accesses made by the processing circuitry, by ensuring that the memory accesses are constrained having regard to range and permission information associated with certain capabilities. Such an approach can be used to constrain not only the data accessed in memory, but also the address range from which instructions can be retrieved for execution.Some processors may be able to execute instructions from different instruction sets, and accordingly control information can be maintained to identify the current instruction set, with that control information being changed when it is decided to switch operation to execution of a different instruction set.However, within a capability-based architecture, the ability to change instruction set can potentially undermine some of the security benefits achievable through the use of capabilities. In particular, changing instruction set changes the interpretation of instruction data fetched from memory, and hence can change the interpretation of read only code held in memory. It would be desirable to mitigate against the possibility of inadvertent or malicious attempts to change instruction set within a capability-based system.In a first example configuration, there is provided an apparatus comprising: processing circuitry to execute instructions of an instruction set, the processing circuitry being arranged to operate in a capability domain comprising capabilities used to constrain operations performed by the processing circuitry when executing said instructions; and a PCT/GB2018/051116 WO 2018/229455 program counter capability storage element to store a program counter capability used by the processing circuitry to determine a program counter value; the processing circuitry being arranged to employ a capability based mechanism to change the instruction set, in response to execution of at least one type of instruction that is used to load an identified capability into the program counter capability storage element, the processing circuitry being arranged to invoke the capability based mechanism in order to perform a capability check operation in respect of the identified capability and to cause the instruction set to be identified by an instruction set identifier field from the identified capability provided the capability check operation is passed.In another example configuration, there is provided a method of controlling a change in instruction set within an apparatus having processing circuitry to execute instructions of a current instruction set, the processing circuitry being arranged to operate in a capability domain comprising capabilities used to constrain operations performed by the processing circuitry when executing said instructions, the method comprising: storing, within a program counter capability storage element, a program counter capability used by the processing circuitry to determine a program counter value; arranging the processing circuitry to be responsive to execution of at least one type of instruction that is used to load an identified capability into the program counter capability storage element, to invoke a capability based mechanism to control change of the current instruction set, said capability based mechanism comprising: performing a capability check operation in respect of the identified capability; and causing the instruction set to be identified by an instruction set identifier field from the identified capability provided the capability check operation is passed.In a further example configuration, there is provided an apparatus comprising: processing means for executing instructions of an instruction set, the processing means for operating in a capability domain comprising capabilities used to constrain operations performed by the processing means when executing said instructions; and a program counter capability storage element means for storing a program counter capability used by the processing means to determine a program counter value; the processing means employing a capability based mechanism to change the instruction set, in response to execution of at least one type of instruction that is used to load an identified capability into the program counter capability storage element, the processing means for invoking PCT/GB2018/051116 WO 2018/229455 the capability based mechanism in order to perform a capability check operation in respect of the identified capability and to cause the instruction set to be identified by an instruction set identifier field from the identified capability provided the capability check operation is passed.In a yet further example configuration, there is provided a virtual machine computer program comprising program instructions to control a host data processing apparatus to provide an instruction execution environment corresponding to the apparatus of the first example configuration discussed above. In one embodiment a computer- readable storage medium may be provided for storing the virtual machine computer program.BRIEF DESCRIPTION OF THE DRAWINGSThe present technique will be described further, by way of example only, with reference to embodiments thereof as illustrated in the accompanying drawings, in which:Figure 1 is a block diagram of an apparatus in accordance with one embodiment;Figure 2 shows examples of types of instruction for which an error may be triggered if there is an attempt to set or access a pointer value within a set of bounded pointer storage elements where that pointer value is used to specify an address outside the range indicated by the associated range information;Figure 3 illustrates the use of a tag bit in association with bounded pointers, in accordance with one embodiment;Figure 4 schematically illustrates how an instruction set identifier field may be incorporated within a capability in accordance with one embodiment;Figure 5 is a flow diagram illustrating steps performed to implement a capability-based mechanism for controlling a change in instruction set, in accordance with one embodiment;Figure 6 is a flow diagram providing more details of the capability-based mechanism for controlling a change in instruction set, in situations where the capability check is performed before loading the capability into the program counter capability storage element, in accordance with one embodiment; PCT/GB2018/051116 WO 2018/229455 Figure 7 is a flow diagram providing more details of the capability-based mechanism for controlling a change in instruction set, in situations where the capability check is performed after loading the capability into the program counter capability storage element, in accordance with one embodiment;Figure 8 is a flow diagram illustrating steps performed during the capability check operation in accordance with one embodiment;Figures 9A and 9B illustrate two alternative approaches for using the instruction set identifier field information when a branch instruction is executed in order to load a capability into the program counter capability storage element;Figure 10 is a flow diagram illustrating an exception-based mechanism that in some embodiments may also be used to allow a change in instruction set; andFigure 11 illustrates a virtual machine implementation that may be used. DESCRIPTION OF EMBODIMENTSBefore discussing the embodiments with reference to the accompanying figures, the following description of embodiments is provided.As mentioned earlier, there is an increasing interest in capability-based architectures in which certain capabilities are defined for a given process, and an error can be triggered if there is an attempt to carry out operations outside the defined capabilities. Various types of capabilities may be defined, but one type of capability is a bounded pointer (which in one embodiment incorporates both a pointer value and associated range and permissions information).An apparatus adopting such a capability-based architecture will typically have storage elements (also referred to herein as bounded pointer storage elements, or more generally capability storage elements) that are used to store the capabilities. The storage elements can be registers (also referred to herein as bounded pointer registers or capability registers) and/or can be memory locations in general purpose memory, for example a location on a stack memory. Certain instructions can be used to reference such storage elements in order to access a desired capability, and perform operations dependent on that capability. For example, considering a bounded pointer, execution of such an instruction can cause the bounded pointer to be retrieved, and for the pointer value therein to then be used to derive an address in memory required during execution of the instruction. The pointer value may be used directly to identify PCT/GB2018/051116 WO 2018/229455 the memory address, or may be used to derive the memory address, for example by the addition of an offset to the pointer value. The operation will then be allowed to proceed provided that the memory address is within the range specified by the range information, and any permissions specified in the permissions information are met.Hence, when using bounded pointers, the pointer value itself may point to, or be used to determine, the address of a data value to be accessed or an instruction to be fetched for execution, for example. However the range and permission information may then be referred to, for example, to ensure that any address accessed is within an allowable range, and being accessed for an allowed purpose. This can be useful for example for ensuring that the address determined from the pointer remains within certain bounds to maintain security or functional correctness of behaviour. By such an approach, it is possible to effectively police memory accesses made by the processing circuitry.However, in systems that support use of multiple instruction sets, then the ability to change instruction set could potentially circumvent some of the protection afforded through the use of capabilities. In particular, the interpretation of instruction data fetched from memory will be different once the indication of the instruction set has been changed. Hence, whilst the capability-based architecture may limit the range of addresses from which instructions may be fetched, an inadvertent or malicious attempt to change the instruction set may cause the processing circuitry to legitimately fetch an instruction of a first instruction set as allowed by the constraints of the capability-based architecture, but for the processing circuitry to then seek to interpret that fetched instruction in accordance with a second instruction set, potentially bringing about undesirable operational behaviour of the processor.The embodiments described herein seek to provide a controlled mechanism for changing instruction set, to seek to reduce the ability of inadvertent or malicious attempts to change the instruction set.In one embodiment, an apparatus has processing circuitry for executing instructions of an instruction set, the processing circuitry being arranged to operate in a capability domain comprising capabilities used to constrain operations performed by the processing circuitry when executing the instructions. The capability domain comprises a set of capabilities formed by the capabilities currently residing in PCT/GB2018/051116 WO 2018/229455 capability storage elements accessible to the processing circuitry, and any further capabilities accessible via the capabilities held in those capability storage elements. One of the capability storage elements is a program counter capability storage element that is used to store a program counter capability used by the processing circuitry to determine a program counter value. The program counter value is then used to identify an address in memory from which to fetch instructions.In the described embodiments, the processing circuitry can be arranged to employ a capability based mechanism to change the instruction set. In particular, in response to execution of at least one type of instruction that is used to load an identified capability into the program counter capability storage element, the processing circuitry is arranged to invoke the capability based mechanism in order to perform a capability check operation in respect of the identified capability. As a result of performing the capability check operation, this causes the instruction set to be identified by an instruction set identifier field from the identified capability, provided the capability check operation is passed.As a result of employing this capability based mechanism, when the processing circuitry seeks to update the program counter capability by executing an instruction to load an identified capability into the program counter capability storage element, it is necessary for the capability check operation to be passed before an instruction set identifier field within the identified capability is allowed to identify the instruction set. When the capability check operation is passed, this mechanism hence allows the instruction set to be changed, but if the capability check operation is failed this update in instruction set will be prevented, and instead an alternative action will be taken, for example by taking an exception.The timing of the capability check operation can be varied dependent on embodiment. For example, in one embodiment the processing circuitry may be arranged to perform the capability check operation on the identified capability prior to loading that identified capability into the program counter capability storage element. As a result of such an approach, it is known whether the capability check operation is passed or failed before it is decided whether to allow the identified capability to be loaded into the program counter capability storage element.
PCT/GB2018/051116 WO 2018/229455 However, in an alternative embodiment the processing circuitry may be arranged to perform the capability check operation on the identified capability after loading that identified capability into the program counter capability storage element. This can avoid any delay in execution of the instruction that loads the identified capability into the program counter capability storage element, whilst still ensuring that that updated program counter capability is not relied upon before the capability check operation is performed. For example, as soon as the next instruction is to execute, this can trigger performance of the capability check operation, hence avoiding any details of that updated program counter capability being used before it is determined whether the capability check operation is passed, and hence in particular avoiding interpreting any fetched instruction in accordance with a changed instruction set as might be indicated by the instruction set identifier field from the identified capability, unless the capability check operation is determined to have been passed.There are a number of actions that the processing circuitry could be arranged to take when detecting failure of the capability check operation, but in one embodiment the processing circuitry is arranged to take an exception. In one embodiment, this may for example cause a software exception handler to record certain information relating to the failure of the capability check operation, and to then transfer control to an appropriate error handling routine to deal with the attempted change in instruction set. Whilst the error handling routine may take a variety of steps, in one embodiment it may choose to terminate the application that sought to invoke the change in instruction set, since as mentioned earlier in one embodiment it is highly desirable to tightly control the ability to change instruction set, so as to mitigate against the possibility of a change in instruction set being used to seek to circumvent the protection afforded by the use of capabilities.Whilst in one embodiment an exception may be taken immediately in response to detecting failure of the capability check operation, in an alternative embodiment a flag may be set to identify failure of the capability check operation, with the setting of the flag causing the exception to be taken when a next instruction is to be executed. This allows certain events to happen in between the time the failure condition is detected and the flag is set, and the time the exception is taken. For example, it can allow a higher priority exception/interrupt to be taken that preserves the flag PCT/GB2018/051116 WO 2018/229455 information and the program counter capability (PCC) information, and then clears the flag and loads a different program counter capability into the program counter capability storage element. On return from that higher priority exception/interrupt, the flag and PCC information will then be restored, and when the next instruction is to be executed the presence of the set flag will cause the exception to be taken.The at least one type of instruction that is used to load an identified capability into the program counter capability storage element can take a variety of forms, but in one embodiment the instruction is a branch instruction, such that the processing circuitry is arranged to invoke the capability based mechanism by executing a branch instruction specifying the identified capability.The branch instruction can take a variety of forms. For instance, it may be a branch instruction that explicitly identifies via a source operand the identified capability. For example, the apparatus will typically comprise one or more capability storage elements that are accessible to the processing circuitry, and that are arranged to store capabilities used to constrain operations performed by the processing circuitry when executing the instructions. The branch instruction may then specify one of those capability storage elements as a source operand, with the specified capability storage element then containing the identified capability.In other examples, the branch instruction may implicitly identify the identified capability. For example, the branch instruction may take the form of a return instruction which is executed in order to load into the program counter capability storage element a return address capability forming the identified capability. Typically, the return instruction does not need to explicitly identify the return address capability, since there will be a default storage element containing the return address capability, in one example this being referred to as the capability exception link register (CELR).The capability check operation can take a variety of forms, and hence by way of example a variety of different fields within the identified capability may be referred to during performance of the capability check operation in order to decide whether the capability check operation is passed or failed. For example, in one embodiment the processing circuitry may be arranged, when performing the capability check operation, to check a valid flag associated with the identified capability in order to prevent the PCT/GB2018/051116 WO 2018/229455 capability check operation being passed unless the identified capability is a valid capability. Hence, whenever the processing circuitry seeks to update the program counter capability storage element contents using information that does not represent a valid capability, this will cause the capability check operation to fail.Alternatively, or in addition, the capability check operation may be arranged to refer to one or more permission flags provided within the identified capability. In particular, the identified capability will typically comprise one or more permission flags used to identify the state of one or more permissions associated with the identified capability. For example, the permissions may be used to restrict the use of the capability to certain types of operation, certain modes of operation of the processing circuitry, etc. Different permissions may also be associated with different types of information being accessed, so that for example different write and read permissions may be set dependent on whether the information being accessed is itself a capability, or a normal data value.Within such embodiments, the processing circuitry may be arranged, when performing the capability check operation, to check one or more permission flags in order to prevent the capability check operation being passed unless at least one permission is in a predetermined state.By such an approach, it is possible to constrain the ability to change the instruction set to situations where the identified capability has at least one permission in a particular state. As one example, the at least one permission may comprise an executable permission used to identify whether the identified capability, when used as the program counter capability, is allowed to be used to fetch instructions from memory, and the predetermined state is a set state indicating that the identified capability is allowed to be used to fetch instructions from memory, subject to any overriding control information preventing use of the identified capability to fetch instructions from memory. In one embodiment, if the executable permission were in the clear state, this would identify that the capability, when forming a program counter capability, is prevented from being used to fetch instructions from the memory. Hence, this would identify that the capability was not suitable for being used as a program counter capability, and hence if an instruction is seeking to load that capability into the program counter capability storage element, the capability check operation may in one embodiment be failed, preventing the contents of PCT/GB2018/051116 WO 2018/229455 the instruction set identifier field within that identified capability from being used to identify the instruction set.As another example of how the permission flags may be checked, the at least permission may comprise a modifiable permission used to identify whether the identified capability is modifiable by one or more capability modifying instructions, and the predetermined state is a clear state indicating that the capability is unmodifiable by said one or more capability modifying instructions. When the identified capability is marked as being unmodifiable, this can provide additional reassurance that the content of the instruction set identifier field will not have been tampered with in the period of time between when the capability was established (for example by a process operating at a particular privileged level), and a process (which may not be at that privileged level) subsequently seeks to load that capability into the program counter capability.There are a number of ways in which the contents of the instruction set identifier field from the identified capability can be used to identify the instruction set, in situations where the capability check operation is passed. In one embodiment, when the capability check operation is passed, the processing circuitry is arranged to cause the identified capability, including the instruction set identifier field, to be used to form a new program counter capability within the program counter capability storage element. Further, the value of the instruction set identifier field within the new program counter capability is used to determine the instruction set. Hence, in such embodiments the current instruction set is identified by the contents of an associated instruction set identifier field within the program counter capability.However, in an alternative embodiment, when the capability check operation is passed, the processing circuitry is arranged to cause the identified capability to be used to form a new program counter capability within the program counter capability storage element but with a field in the new program counter capability corresponding to the instruction set identifier field being set to a default value. The processing circuitry further causes the value within the instruction set identifier field of the identified capability to be written into an instruction set control storage element, and the value within the instruction set control storage element is used to determine the instruction set. Hence, in such an embodiment, as the identified capability is loaded into the program counter capability storage element, the contents of the instruction set identifier field are extracted and PCT/GB2018/051116 WO 2018/229455 written into an instruction set control storage element. Hence, in such embodiments, it is the contents of the instruction set control storage element that are used to determine the current instruction set.The instruction set control storage element can take a variety of forms, but in one embodiment is provided by a field within a current processor state register (CPSR).In one embodiment, the earlier described capability based mechanism for changing the instruction set may be the only mechanism provided to allow the instruction set to be changed. However, in an alternative embodiment the processing circuitry may further provide an exception based mechanism to change the instruction set, on invoking the exception based mechanism the processing circuitry being arranged to take an exception into a predefined state, where trusted software is then executed to establish return state that identifies the instruction set to be used on return from the exception. Hence, by such an approach, it is possible to use a trusted exception/exception return mechanism to trigger the use of trusted software to modify the instruction set.Whilst one or more further controlled mechanisms may also be provided for changing instruction set, in one particular embodiment the processing circuitry may be constrained so as to only allow the instruction set to be changed by using either the capability based mechanism or the exception based mechanism. By tightly constraining the way in which the instruction set can be changed, this provides increased resilience to inadvertent or malicious attempts to seek to change the instruction set, which could potentially circumvent one or more of the security measures put in place through the use of capabilities.Particular embodiments will now be described with reference to the Figures.Figure 1 schematically illustrates an example of a data processing apparatus comprising a processing pipeline 4 for processing instructions. In this example the processing pipeline 4 includes a number of pipeline stages including a fetch stage 6, a decode stage 8, an issue stage 10, an execute stage 12, and a write back stage 14, but it will be appreciated that other types or combinations of stages may be provided. For example a rename stage for performing register renaming could be included in some embodiments. Instructions to be processed move from stage to stage, and while an instruction is pending at one stage another instruction may be pending at a different stage of the pipeline 4.
PCT/GB2018/051116 WO 2018/229455 The fetch stage 6 fetches instructions from a level 1 (LI) instruction cache 20. The fetch stage 6 may usually fetch instructions sequentially from successive instruction addresses. However, the fetch stage may also have a branch predictor for predicting the outcome of branch instructions, and the fetch stage 6 can fetch instructions from a (non-sequential) branch target address if the branch is predicted taken, or from the next sequential address if the branch is predicted not taken. The branch predictor 22 may include one or more branch history tables for storing information for predicting whether certain branches are likely to be taken or not. For example, the branch history tables may include counters for tracking the actual outcomes of previously executed branches or representing confidence in predictions made for branches. The branch predictor 22 may also include a branch target address cache (BTAC) 24 for caching previous target addresses of branch instructions so that these can be predicted on subsequent encounters of the same branch instructions.The fetched instructions are passed to the decode stage 8 which decodes the instructions to generate decoded instructions. The decoded instructions may comprise control information for controlling the execute stage 12 to execute the appropriate processing operations. For some more complex instructions fetched from the cache 20, the decode stage 8 may map those instructions to multiple decoded instructions, which may be known as micro-operations (pops or uops). Hence, there may not be a one-to- one relationship between the instructions fetched from the LI instruction cache 20 and instructions as seen by later stages of the pipeline. In general, references to "instructions" in the present application should be interpreted as including micro- operations.The decoded instructions are passed to the issue stage 10, which determines whether operands required for execution of the instructions are available and issues the instructions for execution when the operands are available. Some embodiments may support in-order processing so that instructions are issued for execution in an order corresponding to the program order in which instructions were fetched from the LI instruction cache 20. Other embodiments may support out-of-order execution, so that instructions can be issued to the execute stage 12 in a different order from the program order. Out-of-order processing can be useful for improving performance because PCT/GB2018/051116 WO 2018/229455 while an earlier instruction is stalled while awaiting operands, a later instruction in the program order whose operands are available can be executed first.The issue stage 10 issues the instructions to the execute stage 12 where the instructions are executed to carry out various data processing operations. For example the execute stage may include a number of execute units 30, 32, 34 including an arithmetic/logic unit (ALU) 30 for carrying out arithmetic or logical operations on integer values, a floating-point (FP) unit 32 for carrying out operations on values represented in floating-point form, and a load/store unit 34 for carrying out load operations for loading a data value from a level 1 (LI) data cache 36 to a register 40 or store operations for storing a data value from a register 40 to the LI data cache 36. It will be appreciated that these are just some examples of the types of execute units which could be provided, and many other kinds could also be provided. For carrying out the processing operations, the execute stage 12 may read data values from a set of registers 40. Results of the executed instructions may then be written back to the registers 40 by the write back stage 14.The LI instruction cache 20 and LI data cache 36 may be part of a cache hierarchy including multiple levels of caches. For example a level two (L2) cache may also be provided and optionally further levels of cache could be provided. In this example the L2 cache 44 is shared between the LI instruction cache 20 and LI data cache 36 but other examples may have separate L2 instruction and data caches. When an instruction to be fetched is not in the LI instruction cache 20 then it can be fetched from the L2 cache 44 and similarly if the instruction is not in the L2 cache 44 then it can be fetched from main memory 50. Similarly, in response to load instructions, data can be fetched from the L2 cache 44 if it is not in the LI data cache 36 and fetched from memory 50 if required. Any known scheme may be used for managing the cache hierarchy.The addresses used by the pipeline 4 to refer to program instructions and data values may be virtual addresses, but at least the main memory 50, and optionally also at least some levels of the cache hierarchy, may be physically addressed. Hence, a translation lookaside buffer 52 (TLB) may be provided for translating the virtual addresses used by the pipeline 4 into physical addresses used for accessing the cache or memory. For example, the TLB 52 may include a number of entries each PCT/GB2018/051116 WO 2018/229455 specifying a virtual page address of a corresponding page of the virtual address space and a corresponding physical page address to which the virtual page address should be mapped in order to translate the virtual addresses within the corresponding page to physical addresses. For example the virtual and physical page addresses may correspond to a most significant portion of the corresponding virtual and physical addresses, with the remaining least significant portion staying unchanged when mapping a virtual address to a physical address. As well as the address translation information, each TLB entry may also include some information specifying access permissions such as indicating whether certain pages of addresses are accessible in certain modes of the pipeline 4. In some embodiments, the TLB entries could also define other properties of the corresponding page of addresses, such as cache policy information defining which levels of the cache hierarchy are updated in response to read or write operations (e.g. whether the cache should operate in a write back or write through mode), or information defining whether data accesses to addresses in the corresponding page can be reordered by the memory system compared to the order in which the data accesses were issued by the pipeline 4.While Figure 1 shows a single level TLB 52, it will be appreciated that a hierarchy of TLBs may be provided so that a level one (LI) TLB 52 may include TLB entries for translating addresses in a number of recently accessed pages and a level two (L2) TLB may be provided for storing entries for a larger number of pages. When a required entry is not present in the LI TLB then it can be fetched from the L2 TLB, or from further TLBs in the hierarchy. If a required entry for a page to be accessed is not in any of the TLBs then a page table walk can be performed to access page tables in the memory 50. Any known TLB management scheme can be used in the present technique.Also, it will be appreciated that some systems may support multiple levels of address translation so that, for example, a first TLB (or hierarchy of TLBs) may be used to translate virtual addresses into intermediate addresses, and a second level of address translation using one or more further TLB(s) may then translate the intermediate addresses into physical addresses used to access a cache or memory. This can be useful for supporting virtualisation where the first level of address translation PCT/GB2018/051116 WO 2018/229455 may be managed by the operating system and the second level of address translation may be managed by the hypervisor, for example.As shown in Figure 1, the apparatus 2 may have a set of bounded pointer registers 60. Whilst the set of bounded pointer registers is shown in Figure 1 as being physically separate to the set of general purpose data registers 40, in one embodiment the same physical storage may be used to provide both the general purpose data registers and the bounded pointer registers.Each bounded pointer register 60 includes a pointer value 62 that may be used to determine an address of a data value to be accessed, and range information specifying an allowable range of addresses when using the corresponding pointer 62. The bounded pointer register 60 may also include restrictions information 66 (also referred to herein as permissions information) which may define one or more restrictions/permissions on the use of the pointer. For example the restriction 66 could be used to restrict the types of instructions which may use the pointer 62, or the modes of the pipeline 4 in which the pointer can be used. Hence, the range information and restriction information 66 may be considered to define capabilities within which the pointer 62 is allowed to be used. When an attempt is made to use a pointer outside the defined capabilities, an error can be triggered. The range information can be useful for example for ensuring that pointers remain within certain known bounds and do not stray to other areas of the memory address space which might contain sensitive or secure information. In an embodiment where the same physical storage is used for both general purpose data registers and bounded pointer registers, then in one embodiment the pointer value 62 may for example be stored within the same storage location as used for a corresponding general purpose register.Figure 2 shows an example of types of instructions for which the allowable range is used to protect against unauthorised access to data or instructions. As shown in the top part of Figure 2, a particular bounded pointer register PR1 includes a given pointer value 62 and range information 64, which in this example is specified using a lower bound address 68 defining the lower bound of the allowable range and an upper bound address 69 defining the upper bound of the allowable range. For example, the bounds 68, 69 are set to define a range of addresses 80000 to 81000. Errors may be PCT/GB2018/051116 WO 2018/229455 triggered when certain instructions reference the bounded pointer register PR1 and the address determined from the pointer 62 is outside this range.For example, as shown in part A of Figure 2, in some systems an error may be triggered if there is an attempt to set the value of the pointer 62 in the pointer register to a value lying outside the range specified by the range information 64 (here it being assumed that the pointer directly specifies an address). This avoids the pointer taking any value outside the specified range so that any accesses using the pointer can be ensured to lie safely within the allowed range. Alternatively, as shown in part B of Figure 2, an error can be triggered when an instruction attempts to access a location identified by the address of the pointer 62 when that address lies outside the specified range. Hence, it may still be allowable to set the pointer 62 to a value outside the specified range, but once a data access at the pointer address (or an address derived from the pointer) is attempted then an error may be triggered if the address lies outside the allowed range. Other systems may trigger errors in response to both the types of instruction shown in parts A and B of Figure 2.The range information 64 could be set in different ways. For example secure code, or an operating system or hypervisor, may specify the range allowed for a given pointer. For example, the instruction set architecture may include a number of instructions for setting or modifying the range information 64 for a given pointer 62, and execution of these instructions could be restricted to certain software or certain modes or exception levels of the processor 4. Any known technique for setting or modifying the range information 64 could be used.In addition to the set of bounded pointer storage elements 60 that may be used at the execute state 12 when executing certain instructions that make reference to a pointer, a program counter capability (PCC) register 80 may also be used to provide similar functionality at the fetch stage 6 when instructions are being fetched from the level one instruction cache 20. In particular, a program counter pointer may be stored in a field 82, with the PCC 80 also providing range information 84 and any appropriate restriction information 86, similar to the range and restriction information provided with each of the pointers in the set of bounded pointer storage elements 60.Further, in one embodiment non-bounded pointers may also be specified within the general purpose registers 40 and used when performing memory accesses. To limit PCT/GB2018/051116 WO 2018/229455 memory addresses that may be accessed using such non-bounded pointers, a Default Data Capability (DDC) register 90 may be provided that specifies both range information 92 and any restriction data 94, similar to the range and restriction information included within any of the capability registers. Then, when a memory access instruction is executed that identifies a memory address with reference to a non- bounded pointer in a general purpose register 40, a bound check operation similar to the bound check operation performed in respect of bounded pointers can still be performed based on any address derived from that non-bounded pointer, but in this instance having regards to the range and restriction information held within the DDC register 90. By such an approach, it is possible for example for capability aware code that wishes to utilise some capability unaware code in an existing software library to set the DDC register 90 so as to place constraints on how pointers accessed from the general purpose register 40 are used when executing that capability unaware code. In particular, the range information can be used to limit the address range that can be accessed when executing such capability unaware code.Any particular range of memory addresses identified by a bounded pointer within a bounded pointer register may contain data, instructions and/or other capabilities (i.e. other bounded pointers). Hence, it will be appreciated that at any point in time the processing circuitry’s ability to access memory is defined by a set of capabilities comprising the capabilities identified in the bounded pointer registers and any further capabilities accessible via the capabilities held in those bounded pointer registers, and this set of capabilities will be referred to herein as a capability domain.The range information and any associated restrictions specified in the PCC register 80 or the DDC register 90 can be set in a variety of ways. However, in one embodiment that information is determined using one or more of the bounded pointers available to the processing circuitry in a current capability domain, so that no memory address can be accessed using PCC or DDC based bound checks that resides outside the memory address range(s) identified for the current capability domain.Figure 3 schematically illustrates how a tag bit is used in association with individual data blocks to identify whether those data blocks represent a capability (i.e. a bounded pointer and associated restrictions information), or represent normal data. In particular, the memory address space 110 will store a series of data blocks 115, which PCT/GB2018/051116 WO 2018/229455 typically will have a specified size. Purely for the sake of illustration, it is assumed in this example that each data block comprises 128 bits. In association with each data block 115, there is provided a tag field 120, which in one example is a single bit field referred to as the tag bit, which is set to identify that the associated data block represents a capability, and is cleared to indicate that the associated data block represents normal data, and hence cannot be treated as a capability. It will be appreciated that the actual value associated with the set or the clear state can vary dependent on embodiment, but purely by way of illustration, in one embodiment if the tag bit has a value of 1, it indicates that the associated data block is a capability, and if it has a value of 0 it indicates that the associated data block contains normal data.When a capability is loaded into one of the bounded pointer registers 60 (also referred to herein as a capability register), such as the capability register 100 shown in Figure 3, then the tag bit moves with the capability information. Accordingly, when a capability is loaded into the capability register 100, the pointer 102, range information 104 and restrictions information 106 (hereafter referred to as the permissions information) will be loaded into the capability register. In addition, in association with that capability register, or as a specific bit field within it, the tag bit 108 will be set to identify that the contents represent a capability. Similarly, when a capability is stored back out to memory, the relevant tag bit 120 will be set in association with the data block in which the capability is stored. By such an approach, it is possible to distinguish between a capability and normal data, and hence ensure that normal data cannot be used as a capability.In one embodiment, the apparatus may be arranged so that it can operate at different exception levels, where each exception level has different software execution privilege. Further, an exception mechanism may be used to transition between the plurality of exception levels. However, in one embodiment not all exceptions will cause the exception level to change.As shown in Figure 1, the apparatus 10 has access to a variety of control/status registers 70 which store various control and status information referenced by the processing circuitry during its operation, the control/status registers 70 including a variety of registers that are used during the handling of exceptions.
PCT/GB2018/051116 WO 2018/229455 As shown in figure 1, current process state 74 is maintained within the control/status registers 70, to capture a variety of execution state information relating to the processor’s current operation. While shown as a single box 74, the current process state will not necessarily all be stored within a single register, but may be stored within a number of control and status registers within the available control/status registers 70.During operation, an exception may be triggered by a variety of different mechanisms, for example an interrupt, a system call, a fault, etc. In accordance with one embodiment, when an exception is taken, an exception entry mechanism is triggered, and during this process the current process state 74 is captured as saved process state 72. Again, the saved process state 72 may be stored within a single register, or within multiple registers. An exception handling operation is then performed by the processing circuitry to process the exception. When the processing circuitry subsequently returns from the exception, the saved process state will be restored into the current process state, allowing the processing circuitry to continue the operations that it was performing prior to the exception being taken.To enable execution state of the processing circuitry to be maintained for multiple exception levels, separate saved process state registers (SPSRs) 72 and current process state registers (CPSRs) 74 can be maintained for multiple of the exception levels if desired.On exception entry, the program counter capability register 80 may be updated using exception entry address capability information stored in a capability control storage element 79. In particular, the register 79 will store information about the appropriate address to be used on exception entry, and also associated capability information to be provided in addition with that address to form a program counter capability to be stored within the PCC register 80. The exception entry address information in the register 79 can take a variety forms, but in one embodiment the register 79 takes the form of a capability vector base address register (CVBAR). This register provides a base address for exception entry, and the exception determines an offset from this base address in dependence on the exception type. Hence, information about the type of exception will be used to identify the appropriate address to be used to form the program counter capability loaded into the PCC register 80, with the PCT/GB2018/051116 WO 2018/229455 remaining portion of the capability information for the PCC register being formed from the corresponding portion of the capability in the CVBAR.As mentioned earlier, on taking an exception, the current process state 74 is captured as saved process state 72. In addition, the current program counter capability stored within the PCC register 80 is used to identify a preferred return address capability. The preferred return address will be dependent on the type of exception, but will typically be the program counter value, or the program counter value incremented by the instruction size (for example incremented by 4 assuming byte sized addressing, and 32-bit instructions). In addition to the preferred return address, the remaining capability information from the current program counter capability will also be copied into the return address capability generated from the PCC. In one embodiment, the return address capability generated in this manner will be stored within a dedicated return address capability register, in one particular embodiment this being the capability exception link register (CELR) 78. On later returning from an exception, the contents of the CELR register 78 can be restored into the PCC register 80, and in addition the contents of the SPSR register 72 can be restored into the CPSR register 74 for the relevant exception level.The use of a capability-based system as described above can significantly enhance security and functional correctness of behaviour of the system. For example, through use of such an approach it is possible to effectively police memory accesses made by the processing circuitry, to control both the instructions fetched from memory for execution, and the data values manipulated by the processor when executing those instructions. However, as mentioned earlier, some systems allow for the execution of instructions from multiple instruction sets, with control state being maintained to identify the current instruction set being used, and hence identifying how the instruction data fetched from memory should be interpreted when decoding the instructions for execution. An inadvertent or malicious attempt to change the instruction set could circumvent some of the protection afforded by the use of capabilities, since it may enable a change in the interpretation of read only code held in memory. The embodiments described herein provide a mechanism for tightly controlling how the instruction set can be changed within such an apparatus, with the aim of alleviating such risks.
PCT/GB2018/051116 WO 2018/229455 Figure 4 illustrates how a capability may be supplemented with an additional field that serves as an instruction set identifier field. In particular, the capability 150 in this example is assumed to be a bounded pointer, hence having a pointer value 158, and associated range and permissions fields 156, 154, respectively. A tag bit 152 is also provided to indicate whether the associated information represents a valid capability or not. The permissions encoded within the permissions fields 154 can be determined by the state of a number of permission flags provided within those fields, such that the values of the permission flags are used to determine the state of one or more permissions. These permissions can take a variety of forms, but in one embodiment may include at least an executable permission identifying whether the associated capability, when used as the program counter capability, is allowed to be used to fetch instructions from memory, and a modifiable permission used to identify whether the associated capability is modifiable by one or more capability modifying instructions. In one embodiment, the permissions may need to be interpreted in combination with other control information that may affect the permissions. Hence, in one embodiment, if the permission is in a clear state this indicates that that permission is not granted in respect of the capability. However, if the permission is in the set state, then this will in one embodiment indicate that the permission is granted, subject to any overriding control information that may affect the granting of that permission.As also shown in Figure 4, a field 160 can be provided to identify an instruction set. The size of this field will depend on the number of instruction sets supported, but by way of example if there are merely two supported instruction sets, a single bit field will be sufficient to enable each of the two instruction sets to be identified.Whilst the instruction set identifier field may be a separate dedicated field, in one embodiment it can be formed by one or more least significant bits of the pointer value field. For example, due to memory alignment constraints on the pointer value, it may be that one or more least significant bits of the pointer value are unused, and accordingly those unused bits can be used to provide the instruction set identifier field.In one embodiment, the instruction set identifier field value has no relevance whilst the capability is a general purpose capability within one of the general purpose capability registers 60. However, when the capability is to be loaded into the PCC PCT/GB2018/051116 WO 2018/229455 register 80 to form a new program counter capability, the instruction set identifier field information can be used in order to identify the instruction set that will be applicable once that capability is used as a new program counter capability. This hence provides a simple mechanism for enabling the instruction set to be altered.However, in order to ensure that the use of such an instruction set identifier field to specify the instruction set is robust against misuse, then whenever an instruction is used to load an identified capability into the PCC register 80, a capability based mechanism is invoked in order to perform a capability check operation in respect of the identified capability, before allowing the instruction set to be changed using the instruction set identifier field information from the identified capability.Figure 5 is a flow diagram providing a general overview of the capability based mechanism used in one embodiment to control a change in instruction set. In one embodiment, the capability based mechanism is triggered when a certain type of instruction seeks to load an identified capability into the program counter capability register 80. In particular, the capability based mechanism may be triggered when a branch instruction is used for that purpose. Accordingly, at step 200 it is determined whether a branch instruction is to be executed by the processor, where that branch instruction specifies a capability. The branch instruction may specifically identify a source capability register within the set of capability registers 60, with that source capability register containing the identified capability that is to be loaded into the PCC register 80. However, other forms of branch instruction may also be detected at step 200. For example, a return instruction used to return back to some previous code following the earlier taking of an exception can also be considered to be a branch instruction of the type that should be detected at step 200, since again it will cause the PCC register 80 contents to be updated with an identified capability. In the example of a return instruction, the register containing the identified capability may not need to be explicitly identified, since it may be implicit from the return instruction. In particular, in one embodiment a return instruction will cause the contents of the CELR register to be loaded into the PCC register 80.Having identified that a branch instruction is to be executed that will be used to load an identified capability into the program counter capability register, the process proceeds to step 205, where a capability check operation is performed for the PCT/GB2018/051116 WO 2018/229455 identified capability. As will be discussed later with reference to Figures 6 and 7, the timing of performance of the capability check operation can be varied dependent on embodiment. For example, it may be performed prior to updating the PCC register contents, or after those contents have been updated. However, in one embodiment, irrespective of which approach is taken, the capability check is performed so that no action will be taken in dependence on the updated program counter capability and associated instruction set identifier information, until the capability check has been performed, and has been determined to have been passed.Following performance of the capability check operation at step 205, it is then determined at step 210 whether the check operation has been passed or not. If so, the process proceeds to step 215, where a new valid program counter capability is allowed to be formed from the identified capability, and further the instruction set is determined using the instruction set identifier field from the identified capability. As will be discussed in more detail later with reference to Figures 9A and 9B, the contents of the instruction set identifier field can be copied across into the program counter capability, or instead can be extracted and stored within a separate control register.If at step 210 it is determined that the capability check has not been passed, then the process proceeds to step 220 where a predetermined action is taken. The predetermined action can take a variety of forms, but in one embodiment may involve the taking of an exception directly upon determining that the capability check operation has been failed. Alternatively, the taking of the exception may be deferred, and instead may be triggered by the next instruction being executed in due course.Figure 6 is a flow diagram illustrating in more detail an embodiment where the capability check operation is performed prior to loading the identified capability into the PCC register 80. At step 250, the capability check operation is performed for the identified capability as residing in the source register. It is then determined at step 2whether the capability check operation is passed or not. If so, the process proceeds to step 260 where the branch operation is allowed to complete in order to update the contents of the PCC register 80, and to cause the instruction set identifier field from the identified capability to then be used to indicate the instruction set. Accordingly, if the information in the instruction set identifier field differs from the information identifying the instruction set prior to performance of the branch operation, it will be PCT/GB2018/051116 WO 2018/229455 appreciated that by such a mechanism the instruction set will be changed. Subsequently fetched instructions will then be decoded in accordance with the newly identified instruction set.If the test is failed at step 255, then in one embodiment this may immediately involve the taking of an exception at step 270. However, in an alternative embodiment it may be possible to defer taking of the exception for a period of time. Accordingly, at step 265, it may be determined whether taking of the exception should be deferred or not. If not, then the exception is taken immediately at step 270.However, if the exception is to be deferred, the process proceeds to step 2where a flag is set to identify the failure state of the capability check operation. There are a number of ways in which the flag could be set. For example, there could be a dedicated control field within a control register that is set to identify the failure state of the capability check operation. Alternatively, some property of the program counter capability that is created using the identified capability when the branch operation is allowed to complete at step 280 can be changed so that the updated PCC will trigger the exception when any attempt is made to use it. As a particular example, the tag bit could be cleared in the updated PCC as stored within the PCC register, indicating that the PCC register does not store a valid capability.The branch operation is allowed to complete at step 280, as a result of which the PCC contents will be updated, and the information about the instruction set will be updated using the instruction set identifier field from the identified capability. At step 285, it is determined whether the next instruction is to be executed, and if so the process proceeds to step 290 where it is determined whether the flag is set. Assuming the flag is set, then an exception is taken at step 292, and the flag is cleared. However, if the flag is not set, then the instruction is allowed to be executed at step 294.By using the flag mechanism, this allows certain events to happen in between the time the flag is set, and the time the exception is taken. For example, it can allow a higher priority exception/interrupt to be taken that preserves the flag information and the program counter capability information, and then clears the flag and loads a different program counter capability into the program counter capability register 80. On return from that higher priority exception/interrupt, the flag and PCC information PCT/GB2018/051116 WO 2018/229455 will then be restored, and when the next instruction is to be executed the presence of the set flag will cause the exception to be taken.When the exception is taken at either step 270 or at step 292, a software exception handler will transfer control to an appropriate error handling routine to deal with the attempted change in instruction set. There are a number of steps that the error handling routine could take. However, in one embodiment, since the taking of the exception has resulted due to the fact that an attempt has been made to change instruction set using a capability that has not passed the capability check operation, it may be considered appropriate to terminate the application that caused the branch instruction to be executed. Alternatively, the exception handling routine may be arranged to perform some additional checks and/or clean up operations to make sure that it is safe to allow the instruction set to be changed by completion of the branch operation.Figure 7 is a flow diagram illustrating an alternative approach to Figure 6, where the capability check operation is performed after loading the identified capability into the PCC register 80. Accordingly, as shown at step 300, the branch operation is allowed to complete, as a result of which the PCC register contents will be updated using the identified capability, and in addition the instruction set identifier field from the identified capability will be used to indicate the instruction set.The process then proceeds to step 305 where it is identified whether the next instruction is to be executed, and when it is then the process proceeds to step 3where the capability check operation is performed for the identified capability in the form in which it now resides in the PCC register. If the capability check is considered at step 315 to have been passed, then the process proceeds to step 320, where the process allows a new valid program counter capability to be formed from the identified capability, and also allows the instruction set to be determined using the instruction set identifier field from the identified capability. However, if at step 315 it is determined that the capability check operation is failed, then the process proceeds to step 3where an exception is taken. The exception is then handled in the same way as discussed earlier for steps 270 or 292 of Figure 6.The capability check operation can take a variety of forms, but one embodiment is illustrated by the flow diagram of Figure 8. At step 350, it is PCT/GB2018/051116 WO 2018/229455 determined whether the identified capability is valid. In one embodiment this can be determined by looking at the value of the tag bit. In particular, if the tag bit is set it is considered that the identified capability is a valid capability, whereas if the tag bit is clear it is assumed that the capability is not valid. If it is determined that the identified capability is not valid, then the process proceeds to step 370 where the capability check is indicated as having been failed.However, assuming the identified capability is found to be valid, then in one embodiment one or more additional checks can be performed with reference to one or more permissions provided for the associated capability, the state of these permissions being determined with reference to the values of one or more permission flags held within the permission fields of the capability.For example, in one embodiment, at step 355, it is determined whether a modifiable permission associated with the capability is in the clear state. In particular, the permission flags may be used to encode a modifiable permission, and when the modifiable permission is in the clear state, this may be used to indicate that the associated capability is unmodifiable by one or more capability modifying instructions. This can hence provide enhanced security for that particular capability, by preventing adjustment in the properties of the capability after it has been marked as being unmodifiable. For example, whilst the processing circuitry will not be able in normal operation to extend the range, or set permission flags, in relation to a bounded pointer in order to seek to increase the capability afforded to the processing circuitry by that bounded pointer, if the bounded pointer is not marked as unmodifiable, it may be possible for the processing circuitry to take steps to reduce the range and/or clear permission flags associated with the bounded pointer. However, when the capability is marked as unmodifiable, the processing circuitry will not be able to make any such adjustments.Conversely, if the modifiable permission is in the set state, this indicates that the processing circuitry may be allowed to reduce the range and/or clear certain permission flags, provided there is no overriding control information that prevents such modification.In one embodiment of the capability check operation, as indicated by step 355, if the modifiable permission is not in the clear state, then the capability check is PCT/GB2018/051116 WO 2018/229455 determined to be failed. In particular, in this embodiment, it is determined appropriate to only allow a change in instruction set to take place as a result of loading into the PCC register an unmodifiable capability, as this provides additional reassurance that the contents of the instruction set identifier field will not have been altered since the capability was provided for use by the current process.Accordingly, in the embodiment shown in Figure 8 only if the modifiable permission is in the clear state, will the process be able to advance towards a situation where it determines that the capability check is passed. In one embodiment, no additional checks may be needed, and accordingly once it is determined that the modifiable permission is in the clear state, the process may proceed directly to step 365 where it is determined that the capability check is passed. However, in an alternative embodiment one or more further checks may be performed, for example considering the state of one or more other permissions encoded by the permission flags. For instance, as indicated by box 360, it may be determined whether an executable permission is in the set state. The executable permission is associated with a capability, but is only of relevance when that capability is loaded into the program counter capability register. In particular, the executable permission identifies whether that capability, when forming the program counter capability, is allowed to be used to fetch instructions from memory. Hence, if a capability within the PCC register has the executable permission in the clear state, this indicates that the capability is prevented from being used to fetch instructions from memory. This would hence indicate that the branch instruction is being used to seek to load into the PCC register 80 a capability that is not intended to be used as program counter capability. Accordingly, if the executable permission is in the clear state, the process may proceed to step 3where the capability check is considered to have been failed.Conversely, if the executable permission is in the set state, indicating that the capability is allowed to be used to fetch instructions from memory provided no overriding control information prevents that use, then then process may proceed to step 365 where it is determined that the capability check is passed.Figures 9A and 9B illustrate two options for use of the instruction set identifier field information when executing a branch instruction, in a situation where the capability check is determined to have been passed. As will be apparent from the PCT/GB2018/051116 WO 2018/229455 earlier discussion, in situations where the capability check is determined to have been passed, then the capability within the source capability register Cn is used to form a new program counter capability within the PCC register 80. As shown by option one in Figure 9A, the identified capability 400 within the source capability register Cn is hence copied into the PCC register to form the new PCC 410. In this embodiment, the instruction set identifier field 405 within the identified capability 400 is also copied into the PCC register, to form the new field 415 within the updated program counter capability 410. The processing circuitry is then arranged in this embodiment to use the value in the field 415 of the PCC register to identify the instruction set. Accordingly, if the instruction set identifier within the identified capability 405 specifies an instruction set that is different to the instruction set in use prior to the branch instruction being executed, then once the branch instruction has been executed, and accordingly the PCC register 80 contents have been updated, a change in instruction set will occur by virtue of the updated information in the field 415.Figure 9B illustrates an alternative embodiment where the identified capability 420 within the source capability register Cn is again essentially copied into the PCC register 80 to form a new program counter capability 435. However, in this embodiment, the instruction set identifier field 425 within the identified capability 4is extracted and stored within an instruction set control register 430 provided separately to the PCC register 80. In this embodiment, a default value is then written into the field 440 of the PCC that would otherwise correspond with the instruction set identifier field. In one embodiment, the value within the field 440 is not referred to when using the PCC 435, and hence can be set to any desired value.In one embodiment the instruction set control register 430 may be a separate dedicated register for storing the instruction set information. However, in an alternative embodiment it can be provided by a field within an existing register, for example the current process state register(s) 74.In one embodiment, the earlier described capability-based mechanism may be the only mechanism allowed to change instruction set. However, in another embodiment an additional, exception based, mechanism may be provided as a further mechanism to allow a change in instruction set. This process is illustrated schematically in Figure 10. At step 450 an exception is taken, as a result of which the PCT/GB2018/051116 WO 2018/229455 processor transitions into a predefined state at step 455. The exception may for example cause a transition to a higher exception level, having a higher level of software execution privilege than the process from which the exception was taken. In one embodiment, the instruction set used by the processor when handling the exception is predetermined. For example, a configuration register may be used to specify the instruction set that is applicable to exception handler code executed whilst in the predefined state. Alternatively, a field within the capability vector base address register (CVBAR) referred to earlier may be use to specify the instruction set. In one particular example, bit zero of CVBAR may be used for this purpose. As another alternative, the instruction set may be entirely fixed, so that a specific instruction set is always used for the exception handler code.Having transitioned into the predefined state at step 455, the processor then executes trusted exception handling code in order to establish return state that will be used after returning from the exception. During this process, the instruction set to be used on return from the exception can be set in an appropriate control register. For example, when the instruction set is derived directly from a field within the PCC register, as per the example discussed earlier with reference to Figure 9A, then the content of the CELR register 78 can be updated so that the associated field within the return address capability identifies the instruction set that should apply on return from the exception. Alternatively, if the approach of Figure 9B is used, where the instruction set is for example given by a field within the CPSR 74, then the appropriate field within the SPSR 72 can be manipulated by the trusted software to specify the instruction set that should apply on return from the exception.Following step 460, then a return instruction can be executed at step 465 in order to return from the exception. As part of this process, the contents of the CELR will be restored into the PCC register 80, and the contents of the SPSR 72 will be restored into the CPSR 74. Thereafter, the subsequently fetched instructions will be interpreted in accordance with the newly identified instruction set.Whilst in further embodiments it may be possible to provide one or more additional controlled mechanisms for changing instruction set, in one particular embodiment the processor may be constrained so as to only allow the instruction set to PCT/GB2018/051116 WO 2018/229455 be changed by use of the capability based mechanism or the exception based mechanism described herein.Figure 11 illustrates a virtual machine implementation that may be used. Whilst the earlier described embodiments implement the present invention in terms of apparatus and methods for operating specific processing hardware supporting the techniques concerned, it is also possible to provide so-called virtual machine implementations of hardware devices. These virtual machine implementations run on a host processor 530 running a host operating system 520 supporting a virtual machine program 510. Typically, large powerful processors are required to provide virtual machine implementations which execute at a reasonable speed, but such an approach may be justified in certain circumstances, such as when there is a desire to run code native to another processor for compatibility or re-use reasons. The virtual machine program 510 may be stored on a computer-readable storage medium (which may be a non-transitory medium), and provides an application program interface (instruction execution environment) to an application program 500 which is the same as the application program interface which would be provided by the real hardware which is the device being modelled by the virtual machine program 510. The above described techniques for controlling a change in instruction set may be implemented within a virtual machine environment. For example, software running in, or controlling, a virtual machine, could make use of hardware implementing such a feature.From the above described embodiments, it will be seen that those embodiments provide a highly controlled and constrained technique for changing instruction set within a capability-based architecture. Through the use of such techniques, this provides protection against inadvertent or malicious attempts to change the instruction set, hence alleviating the possibility that a change in instruction set can be used in order to seek to circumvent aspects of the protection provided by the capability-based architecture.In the present application, the words "configured to..." are used to mean that an element of an apparatus has a configuration able to carry out the defined operation. In this context, a "configuration" means an arrangement or manner of interconnection of hardware or software. For example, the apparatus may have dedicated hardware which provides the defined operation, or a processor or other processing device may PCT/GB2018/051116 WO 2018/229455 be programmed to perform the function. "Configured to" does not imply that the apparatus element needs to be changed in any way in order to provide the defined operation.Although illustrative embodiments of the invention have been described in detail herein with reference to the accompanying drawings, it is to be understood that the invention is not limited to those precise embodiments, and that various changes, additions and modifications can be effected therein by one skilled in the art without departing from the scope and spirit of the invention as defined by the appended claims. For example, various combinations of the features of the dependent claims could be made with the features of the independent claims without departing from the scope of the present invention.
Claims (20)
1./
2.Claims1. An apparatus comprising: processing circuitry to execute instructions of an instruction set, the processing circuitry being arranged to operate in a bounded pointer domain comprising bounded pointers used to constrain operations performed by the processing circuitry when executing said instructions, wherein each bounded pointer includes a pointer value and range information specifying an allowable range of addresses when using the bounded pointer; and program counter bounded pointer storage to store a program counter bounded pointer used by the processing circuitry to determine a program counter value; the processing circuitry being arranged to employ a bounded pointer based operation to change the instruction set, in response to execution of at least one type of instruction that is used to load an identified bounded pointer into the program counter bounded pointer storage, the processing circuitry being arranged to invoke the bounded pointer based operation in order to perform a capability bounded pointer check operation in respect of the identified bounded pointer and to cause the instruction set to be identified by an instruction set identifier field from the identified bounded pointer provided the bounded pointer check operation is passed. 2. An apparatus as claimed in claim 1, wherein the processing circuitry is arranged to perform the bounded pointer check operation on the identified bounded pointer prior to loading that identified bounded pointer into the program counter bounded pointer storage.
3. An apparatus as claimed in claim 1, wherein the processing circuitry is arranged to perform the bounded pointer check operation on the identified bounded pointer after loading that identified bounded pointer into the program counter bounded pointer storage.
4. An apparatus as claimed in claim 1, wherein the processing circuitry is arranged to take an exception in response to detecting failure of the bounded pointer check operation.
5. An apparatus as claimed in claim 4, wherein the processing circuitry is arranged to set a flag to identify failure of the bounded pointer check operation, setting of the flag causing the exception to be taken when a next instruction is to be executed. 270935 /
6. An apparatus as claimed in claim 1, wherein: the processing circuitry is arranged to invoke the bounded pointer based operation by executing a branch instruction specifying the identified bounded pointer.
7. An apparatus as claimed in claim 6, further comprising: one or more bounded pointer storage elements accessible to the processing circuitry and arranged to store bounded pointers used to constrain operations performed by the processing circuitry when executing said instructions; wherein the branch instruction specifies one of said one or more bounded pointer storage elements as a source operand, the specified capability bounded pointer storage containing said identified bounded pointer.
8. An apparatus as claimed in claim 6, wherein: said branch instruction comprises a return instruction which is executed in order to load into the program counter bounded pointer storage a return address bounded pointer forming said identified bounded pointer.
9. An apparatus as claimed in claim 1, wherein: the processing circuitry is arranged, when performing said bounded pointer check operation, to check a valid flag associated with the identified bounded pointer in order to prevent the bounded pointer check operation being passed unless the identified bounded pointer is a valid bounded pointer.
10. An apparatus as claimed in claim 1, wherein: the identified bounded pointer comprises one of more permission flags used to identify the state of one or more permissions associated with the identified bounded pointer; and the processing circuitry is arranged, when performing said bounded pointer check operation, to check the one or more permission flags in order to prevent the bounded pointer check operation being passed unless at least one permission is in a predetermined state. 270935 /
11. An apparatus as claimed in claim 10, wherein said at least one permission comprises an executable permission used to identify whether the identified bounded pointer, when used as the program counter bounded pointer, is allowed to be used to fetch instructions from memory, and the predetermined state is a set state indicating that the identified bounded pointer is allowed to be used to fetch instructions from memory, subject to any overriding control information preventing use of the identified bounded pointer to fetch instructions from memory.
12. An apparatus as claimed in claim 10, wherein said at least one permission comprises a modifiable permission used to identify whether the identified bounded pointer is modifiable by one or more bounded pointer modifying instructions, and the predetermined state is a clear state indicating that the bounded pointer is unmodifiable by said one or more bounded pointer modifying instructions.
13. An apparatus as claimed in claim 1, wherein: when the bounded pointer check operation is passed, the processing circuitry is arranged to cause the identified bounded pointer, including the instruction set identifier field, to be used to form a new program counter bounded pointer within the program counter bounded pointer storage; and the value of the instruction set identifier field within the new program counter bounded pointer is used to determine the instruction set.
14. An apparatus as claimed in claim 1, wherein: when the bounded pointer check operation is passed, the processing circuitry is arranged to cause the identified bounded pointer to be used to form a new program counter bounded pointer within the program counter bounded pointer storage but with a field in the new program counter bounded pointer corresponding to the instruction set identifier field being set to a default value, the processing circuitry further causing the value within the instruction set identifier field of the identified bounded pointer to be written into instruction set control storage; and the value within the instruction set control storage is used to determine the instruction set. 270935 /
15. An apparatus as claimed in claim 14, wherein the instruction set control storage is provided by a field within a current processor state register (CPSR).
16. An apparatus as claimed in claim 1, wherein the processing circuitry further provides an exception based operation to change the instruction set, on invoking the exception based operation the processing circuitry being arranged to take an exception into a predefined state, where trusted software is then executed to establish return state that identifies the instruction set to be used on return from the exception.
17. An apparatus as claimed in claim 16, wherein the processing circuitry is constrained so as to only allow the instruction set to be changed by using either the bounded pointer based operation or the exception based operation.
18. A method of controlling a change in instruction set within an apparatus having processing circuitry to execute instructions of a current instruction set, the processing circuitry being arranged to operate in a bounded pointer domain comprising bounded pointers used to constrain operations performed by the processing circuitry when executing said instructions, wherein each bounded pointer includes a pointer value and range information specifying an allowable range of addresses when using the bounded pointer, the method comprising: storing, within program counter bounded pointer storage, a program counter bounded pointer used by the processing circuitry to determine a program counter value; arranging the processing circuitry to be responsive to execution of at least one type of instruction that is used to load an identified bounded pointer into the program counter bounded pointer storage, to invoke a bounded pointer based operation to control change of the current instruction set, said bounded pointer based operation comprising: performing a bounded pointer check operation in respect of the identified bounded pointer; and causing the instruction set to be identified by an instruction set identifier field from the identified bounded pointer provided the bounded pointer check operation is passed. 270935 /
19. An apparatus comprising: processing means for executing instructions of an instruction set, the processing means for operating in a bounded pointer domain comprising bounded pointers used to constrain operations performed by the processing means when executing said instructions, wherein each bounded pointer includes a pointer value and range information specifying an allowable range of addresses when using the bounded pointer; and means for storing a program counter bounded pointer used by the processing means to determine a program counter value; the processing means employing a bounded pointer based operation to change the instruction set, in response to execution of at least one type of instruction that is used to load an identified bounded pointer into the program counter bounded pointer storage element, the processing means for invoking the bounded pointer based operation in order to perform a bounded pointer check operation in respect of the identified bounded pointer and to cause the instruction set to be identified by an instruction set identifier field from the identified bounded pointer provided the bounded pointer check operation is passed.
20. A non-transitory computer-readable storage medium storing a virtual machine computer program comprising program instructions to control a host data processing apparatus to provide an instruction execution environment corresponding to an apparatus, the apparatus comprising: processing circuitry to execute instructions of an instruction set, the processing circuitry being arranged to operate in a bounded pointer domain comprising bounded pointers used to constrain operations performed by the processing circuitry when executing said instructions, wherein each bounded pointer includes a pointer value and range information specifying an allowable range of addresses when using the bounded pointer; and program counter bounded pointer storage to store a program counter bounded pointer used by the processing circuitry to determine a program counter value; the processing circuitry being arranged to employ a bounded pointer based operation to change the instruction set, in response to execution of at least one type of instruction that is used to load an identified bounded pointer into the program counter bounded pointer storage, the processing circuitry being arranged to invoke the bounded pointer based operation in order to perform a bounded pointer check operation in respect of the identified bounded pointer and to 270935 / cause the instruction set to be identified by an instruction set identifier field from the identified bounded pointer provided the bounded pointer check operation is passed.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1709511.8A GB2563580B (en) | 2017-06-15 | 2017-06-15 | An apparatus and method for controlling a change in instruction set |
PCT/GB2018/051116 WO2018229455A1 (en) | 2017-06-15 | 2018-04-27 | An apparatus and method for controlling a change in instruction set |
Publications (3)
Publication Number | Publication Date |
---|---|
IL270935A IL270935A (en) | 2020-01-30 |
IL270935B1 true IL270935B1 (en) | 2024-05-01 |
IL270935B2 IL270935B2 (en) | 2024-09-01 |
Family
ID=59462226
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IL270935A IL270935B2 (en) | 2017-06-15 | 2018-04-27 | An apparatus and method for controlling a change in instruction set |
Country Status (9)
Country | Link |
---|---|
US (1) | US11080058B2 (en) |
EP (1) | EP3639132B1 (en) |
JP (2) | JP2020523680A (en) |
KR (1) | KR102547479B1 (en) |
CN (1) | CN110709817B (en) |
GB (1) | GB2563580B (en) |
IL (1) | IL270935B2 (en) |
TW (1) | TWI786111B (en) |
WO (1) | WO2018229455A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2563580B (en) * | 2017-06-15 | 2019-09-25 | Advanced Risc Mach Ltd | An apparatus and method for controlling a change in instruction set |
US10607015B1 (en) * | 2019-05-16 | 2020-03-31 | Cyberark Software Ltd. | Security risk assessment and control for code |
GB2592069B (en) * | 2020-02-17 | 2022-04-27 | Advanced Risc Mach Ltd | Address calculating instruction |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5758115A (en) * | 1994-06-10 | 1998-05-26 | Advanced Risc Machines Limited | Interoperability with multiple instruction sets |
GB2448149A (en) * | 2007-04-03 | 2008-10-08 | Advanced Risc Mach Ltd | Protected function calling across domains |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS62123552A (en) * | 1985-11-22 | 1987-06-04 | Nec Corp | Allocation system for central processing unit |
GB2289354B (en) * | 1994-05-03 | 1997-08-27 | Advanced Risc Mach Ltd | Multiple instruction set mapping |
JPH08194504A (en) * | 1995-01-13 | 1996-07-30 | Matsushita Electric Works Ltd | Programmable controller |
GB2376097B (en) * | 2001-05-31 | 2005-04-06 | Advanced Risc Mach Ltd | Configuration control within data processing systems |
JP2004013556A (en) * | 2002-06-07 | 2004-01-15 | Matsushita Electric Ind Co Ltd | Processor device, compile device, and its method |
JP3805314B2 (en) * | 2003-02-27 | 2006-08-02 | Necエレクトロニクス株式会社 | Processor |
US7340588B2 (en) * | 2003-11-24 | 2008-03-04 | International Business Machines Corporation | Extending the number of instruction bits in processors with fixed length instructions, in a manner compatible with existing code |
US7802252B2 (en) * | 2007-01-09 | 2010-09-21 | International Business Machines Corporation | Method and apparatus for selecting the architecture level to which a processor appears to conform |
GB2448151B (en) * | 2007-04-03 | 2011-05-04 | Advanced Risc Mach Ltd | Memory domain based security control within data processing systems |
GB2482701C (en) | 2010-08-11 | 2018-12-26 | Advanced Risc Mach Ltd | Illegal mode change handling |
US20120159127A1 (en) * | 2010-12-16 | 2012-06-21 | Microsoft Corporation | Security sandbox |
TWI484413B (en) * | 2012-04-03 | 2015-05-11 | Mstar Semiconductor Inc | Function-based software comparison method |
US9672164B2 (en) * | 2012-05-31 | 2017-06-06 | Nxp Usa, Inc. | Methods and systems for transitioning between a user state and a supervisor state based on a next instruction fetch address |
US20160026486A1 (en) * | 2014-07-25 | 2016-01-28 | Soft Machines, Inc. | An allocation and issue stage for reordering a microinstruction sequence into an optimized microinstruction sequence to implement an instruction set agnostic runtime architecture |
GB2541714B (en) * | 2015-08-27 | 2018-02-14 | Advanced Risc Mach Ltd | An apparatus and method for controlling instruction execution behaviour |
GB2544315B (en) * | 2015-11-12 | 2018-02-14 | Advanced Risc Mach Ltd | An apparatus and method for controlling use of bounded pointers |
GB2544996B (en) * | 2015-12-02 | 2017-12-06 | Advanced Risc Mach Ltd | An apparatus and method for managing bounded pointers |
GB2562102B (en) * | 2017-05-05 | 2019-09-04 | Advanced Risc Mach Ltd | An apparatus and method for managing use of capabilities |
GB2563010B (en) * | 2017-05-25 | 2019-12-25 | Advanced Risc Mach Ltd | An apparatus and method for managing a capability domain |
GB2563009B (en) * | 2017-05-25 | 2019-12-25 | Advanced Risc Mach Ltd | An apparatus and method for interpreting permissions associated with a capability |
GB2563580B (en) * | 2017-06-15 | 2019-09-25 | Advanced Risc Mach Ltd | An apparatus and method for controlling a change in instruction set |
US10635445B2 (en) * | 2018-05-29 | 2020-04-28 | Arm Limited | Handling modifications to permitted program counter ranges in a data processing apparatus |
-
2017
- 2017-06-15 GB GB1709511.8A patent/GB2563580B/en active Active
-
2018
- 2018-04-27 EP EP18722168.4A patent/EP3639132B1/en active Active
- 2018-04-27 JP JP2019567553A patent/JP2020523680A/en active Pending
- 2018-04-27 WO PCT/GB2018/051116 patent/WO2018229455A1/en unknown
- 2018-04-27 CN CN201880037975.8A patent/CN110709817B/en active Active
- 2018-04-27 US US16/619,192 patent/US11080058B2/en active Active
- 2018-04-27 IL IL270935A patent/IL270935B2/en unknown
- 2018-04-27 KR KR1020207000431A patent/KR102547479B1/en active IP Right Grant
- 2018-05-07 TW TW107115419A patent/TWI786111B/en active
-
2023
- 2023-01-27 JP JP2023010685A patent/JP2023038361A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5758115A (en) * | 1994-06-10 | 1998-05-26 | Advanced Risc Machines Limited | Interoperability with multiple instruction sets |
GB2448149A (en) * | 2007-04-03 | 2008-10-08 | Advanced Risc Mach Ltd | Protected function calling across domains |
Also Published As
Publication number | Publication date |
---|---|
GB2563580B (en) | 2019-09-25 |
GB201709511D0 (en) | 2017-08-02 |
US20200117458A1 (en) | 2020-04-16 |
KR20200013049A (en) | 2020-02-05 |
JP2023038361A (en) | 2023-03-16 |
TW201905705A (en) | 2019-02-01 |
TWI786111B (en) | 2022-12-11 |
CN110709817B (en) | 2023-09-22 |
IL270935B2 (en) | 2024-09-01 |
IL270935A (en) | 2020-01-30 |
GB2563580A (en) | 2018-12-26 |
WO2018229455A1 (en) | 2018-12-20 |
CN110709817A (en) | 2020-01-17 |
JP2020523680A (en) | 2020-08-06 |
EP3639132A1 (en) | 2020-04-22 |
EP3639132B1 (en) | 2024-05-29 |
US11080058B2 (en) | 2021-08-03 |
KR102547479B1 (en) | 2023-06-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10528490B2 (en) | Apparatus and method for managing bounded pointers | |
US11461128B2 (en) | Apparatus and method for managing use of capabilities | |
US11347508B2 (en) | Apparatus and method for managing a capability domain | |
JP2023038361A (en) | Apparatus and method for controlling change in instruction set | |
US20230409494A1 (en) | Technique for constraining access to memory using capabilities | |
US20240202139A1 (en) | Technique for constraining access to memory using capabilities | |
US20240193101A1 (en) | Technique for constraining access to memory using capabilities |